Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sven Schäge
@article{DBLP:journals/iacr/CottaarHHLMPRSTW23, author = {Jolijn Cottaar and Kathrin H{\"{o}}velmanns and Andreas H{\"{u}}lsing and Tanja Lange and Mohammad Mahzoun and Alex Pellegrini and Alberto Ravagnani and Sven Sch{\"{a}}ge and Monika Trimoska and Benne de Weger}, title = {Report on evaluation of KpqC candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1853}, year = {2023}, url = {https://eprint.iacr.org/2023/1853}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CottaarHHLMPRSTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HanJKLPRS21, author = {Shuai Han and Tibor Jager and Eike Kiltz and Shengli Liu and Jiaxin Pan and Doreen Riepel and Sven Sch{\"{a}}ge}, editor = {Tal Malkin and Chris Peikert}, title = {Authenticated Key Exchange and Signatures with Tight Security in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {670--700}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_23}, doi = {10.1007/978-3-030-84259-8\_23}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HanJKLPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JagerKRS21, author = {Tibor Jager and Eike Kiltz and Doreen Riepel and Sven Sch{\"{a}}ge}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Tightly-Secure Authenticated Key Exchange, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {117--146}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_5}, doi = {10.1007/978-3-030-77870-5\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JagerKRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DottlingHHKSU21, author = {Nico D{\"{o}}ttling and Dominik Hartmann and Dennis Hofheinz and Eike Kiltz and Sven Sch{\"{a}}ge and Bogdan Ursu}, editor = {Kobbi Nissim and Brent Waters}, title = {On the Impossibility of Purely Algebraic Signatures}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, pages = {317--349}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2\_11}, doi = {10.1007/978-3-030-90456-2\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DottlingHHKSU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingHHKSU21, author = {Nico D{\"{o}}ttling and Dominik Hartmann and Dennis Hofheinz and Eike Kiltz and Sven Sch{\"{a}}ge and Bogdan Ursu}, title = {On the Impossibility of Short Algebraic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {738}, year = {2021}, url = {https://eprint.iacr.org/2021/738}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingHHKSU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanJKLPRS21, author = {Shuai Han and Tibor Jager and Eike Kiltz and Shengli Liu and Jiaxin Pan and Doreen Riepel and Sven Sch{\"{a}}ge}, title = {Authenticated Key Exchange and Signatures with Tight Security in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2021}, url = {https://eprint.iacr.org/2021/863}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanJKLPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HovelmannsKSU20, author = {Kathrin H{\"{o}}velmanns and Eike Kiltz and Sven Sch{\"{a}}ge and Dominique Unruh}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {389--422}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_14}, doi = {10.1007/978-3-030-45388-6\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HovelmannsKSU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchageSL20, author = {Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk and Sebastian Lauer}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {567--596}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_20}, doi = {10.1007/978-3-030-45388-6\_20}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchageSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKRS20, author = {Tibor Jager and Eike Kiltz and Doreen Riepel and Sven Sch{\"{a}}ge}, title = {Tightly-Secure Authenticated Key Exchange, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1279}, year = {2020}, url = {https://eprint.iacr.org/2020/1279}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JagerKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchageSL20, author = {Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk and Sebastian Lauer}, title = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1519}, year = {2020}, url = {https://eprint.iacr.org/2020/1519}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SchageSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HovelmannsKSU18, author = {Kathrin H{\"{o}}velmanns and Eike Kiltz and Sven Sch{\"{a}}ge and Dominique Unruh}, title = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {928}, year = {2018}, url = {https://eprint.iacr.org/2018/928}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HovelmannsKSU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JagerKSS17, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {Authenticated Confidential Channel Establishment and the Security of {TLS-DHE}}, journal = {J. Cryptol.}, volume = {30}, number = {4}, pages = {1276--1324}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9248-2}, doi = {10.1007/S00145-016-9248-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JagerKSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiS17, author = {Yong Li and Sven Sch{\"{a}}ge}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1343--1360}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134006}, doi = {10.1145/3133956.3134006}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiS17, author = {Yong Li and Sven Sch{\"{a}}ge}, title = {No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {818}, year = {2017}, url = {http://eprint.iacr.org/2017/818}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HeuerJSK16, author = {Felix Heuer and Tibor Jager and Sven Sch{\"{a}}ge and Eike Kiltz}, title = {Selective opening security of practical public-key encryption schemes}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {6}, pages = {304--318}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0507}, doi = {10.1049/IET-IFS.2015.0507}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HeuerJSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaderJLS16, author = {Christoph Bader and Tibor Jager and Yong Li and Sven Sch{\"{a}}ge}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Impossibility of Tight Cryptographic Reductions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {273--304}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_10}, doi = {10.1007/978-3-662-49896-5\_10}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaderJLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuerJKS16, author = {Felix Heuer and Tibor Jager and Eike Kiltz and Sven Sch{\"{a}}ge}, title = {On the Selective Opening Security of Practical Public-Key Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2016}, url = {http://eprint.iacr.org/2016/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuerJKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Schage15, author = {Sven Sch{\"{a}}ge}, title = {Tight Security for Signature Schemes Without Random Oracles}, journal = {J. Cryptol.}, volume = {28}, number = {3}, pages = {641--670}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9173-6}, doi = {10.1007/S00145-013-9173-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Schage15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Schage15, author = {Sven Sch{\"{a}}ge}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{TOPAS:} 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1224--1235}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813683}, doi = {10.1145/2810103.2813683}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Schage15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HeuerJKS15, author = {Felix Heuer and Tibor Jager and Eike Kiltz and Sven Sch{\"{a}}ge}, editor = {Jonathan Katz}, title = {On the Selective Opening Security of Practical Public-Key Encryption Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {27--51}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_2}, doi = {10.1007/978-3-662-46447-2\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HeuerJKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaderJLS15, author = {Christoph Bader and Tibor Jager and Yong Li and Sven Sch{\"{a}}ge}, title = {On the Impossibility of Tight Cryptographic Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2015}, url = {http://eprint.iacr.org/2015/374}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaderJLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiSYBS14, author = {Yong Li and Sven Sch{\"{a}}ge and Zheng Yang and Christoph Bader and J{\"{o}}rg Schwenk}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {New Modular Compilers for Authenticated Key Exchange}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_1}, doi = {10.1007/978-3-319-07536-5\_1}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiSYBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LiSYKS14, author = {Yong Li and Sven Sch{\"{a}}ge and Zheng Yang and Florian Kohlar and J{\"{o}}rg Schwenk}, editor = {Hugo Krawczyk}, title = {On the Security of the Pre-shared Key Ciphersuites of {TLS}}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {669--684}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_38}, doi = {10.1007/978-3-642-54631-0\_38}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LiSYKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSYKS14, author = {Yong Li and Sven Sch{\"{a}}ge and Zheng Yang and Florian Kohlar and J{\"{o}}rg Schwenk}, title = {On the Security of the Pre-Shared Key Ciphersuites of {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2014}, url = {http://eprint.iacr.org/2014/037}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiSYKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KohlarSS13, author = {Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {On the Security of {TLS-DH} and {TLS-RSA} in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2013}, url = {http://eprint.iacr.org/2013/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KohlarSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Schage12, author = {Sven Sch{\"{a}}ge}, title = {Efficient and provably secure signature schemes in the standard model}, school = {Bochum University, Germany}, year = {2012}, url = {https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/509}, urn = {urn:nbn:de:hbz:294-35816}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Schage12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JagerKSS12, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {On the Security of {TLS-DHE} in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {273--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_17}, doi = {10.1007/978-3-642-32009-5\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JagerKSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Schage12, author = {Sven Sch{\"{a}}ge}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Strong Security from Probabilistic Signature Schemes}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {84--101}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_6}, doi = {10.1007/978-3-642-30057-8\_6}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Schage12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Schage11, author = {Sven Sch{\"{a}}ge}, editor = {Kenneth G. Paterson}, title = {Tight Proofs for Signature Schemes without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {189--206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_12}, doi = {10.1007/978-3-642-20465-4\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Schage11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKSS11, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {A Standard-Model Security Analysis of {TLS-DHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2011}, url = {http://eprint.iacr.org/2011/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerKSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/JensenSS10, author = {Meiko Jensen and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2010, Miami, FL, USA, 5-10 July, 2010}, pages = {540--541}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CLOUD.2010.61}, doi = {10.1109/CLOUD.2010.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/JensenSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SchageS10, author = {Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {A New RSA-Based Signature Scheme}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {1--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_1}, doi = {10.1007/978-3-642-12678-9\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SchageS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JagerKSS10, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, editor = {Masayuki Abe}, title = {Generic Compilers for Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {232--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_14}, doi = {10.1007/978-3-642-17373-8\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JagerKSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SchageS10, author = {Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, editor = {Radu Sion}, title = {A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {129--142}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_12}, doi = {10.1007/978-3-642-14577-3\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/SchageS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKSS10, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {Generic Compilers for Authenticated Key Exchange (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2010}, url = {http://eprint.iacr.org/2010/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerKSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Schage09, author = {Sven Sch{\"{a}}ge}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Twin Signature Schemes, Revisited}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {104--117}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_10}, doi = {10.1007/978-3-642-04642-1\_10}, timestamp = {Sun, 02 Jun 2019 21:26:38 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Schage09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ChenLGS08, author = {Xuan Chen and Christoph L{\"{o}}hr and Sebastian Gajek and Sven Sch{\"{a}}ge}, title = {Die Sicherheit von {MS} CardSpace und verwandten Single-Sign-On-Protokollen - Browser-basierte Protokolle im Sicherheitscheck}, journal = {Datenschutz und Datensicherheit}, volume = {32}, number = {8}, pages = {515--519}, year = {2008}, url = {https://doi.org/10.1007/s11623-008-0123-7}, doi = {10.1007/S11623-008-0123-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ChenLGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/HelbachSS08, author = {J{\"{o}}rg Helbach and J{\"{o}}rg Schwenk and Sven Sch{\"{a}}ge}, editor = {Robert Krimmer and R{\"{u}}diger Grimm}, title = {Code Voting with Linkable Group Signatures}, booktitle = {3rd International Conference, Co-organized by Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-131}}, pages = {209--221}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/29183}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/HelbachSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/GuneysuPS07, author = {Tim G{\"{u}}neysu and Christof Paar and Sven Sch{\"{a}}ge}, editor = {Stefan Lucks and Ahmad{-}Reza Sadeghi and Christopher Wolf}, title = {Efficient Hash Collision Search Strategies on Special-Purpose Hardware}, booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4945}, pages = {39--51}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88353-1\_4}, doi = {10.1007/978-3-540-88353-1\_4}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/weworc/GuneysuPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.